Solved

wireless router

Posted on 2007-04-09
3
333 Views
Last Modified: 2010-04-24
I want to replace the wired router in my LAN with a wireless router.  This is a LAN with Windows SBS 2003 server with one network card and all clients on a single subset.  I'm planning on just dropping the wireless router in place of the wired router and maintain the same topology.  Are there any security concerns I need to be aware of, aside from setting a strong password for wireless access?
0
Comment
Question by:mattyfatbags
  • 2
3 Comments
 
LVL 39

Accepted Solution

by:
PUNKY earned 125 total points
ID: 18880235
Security:
Change the administrator password. All routers ship with default passwords for the management account, and these are common knowledge on the Internet. Your first step should always be to change the admin password to something unique.
Turn on encryption. No wireless encryption method is perfect, but some is better than none. Without encryption, anyone in the neighborhood can hop on your network, and you probably don't want that. If all the devices you own support WPA, use it (WPA-PSK is the type you want, if that's an option). Otherwise, use 128-bit WEP, which you might have to use if you have older networking products around your office.
Change the name of your network. Many people never change the generic network names like "belkin" and "linksys," and not only will you have trouble identifying which network is yours, you're also telling the world your network may be in a default state and vulnerable to hacking.
Now we're getting into more advanced stuff. These are changes that only the security-paranoid need to consider. More casual users can stick with just those above.

Turn off SSID broadcasting. When you scan for networks in Windows, you get a nice list of networks because they are all broadcasting their SSID, a network ID code. If you don't want your network to show up in this list, turn off SSID broadcasting. The downside: You'll have to type in the network name manually when you first connect to it.
Turn on MAC filtering. A MAC is a unique code that every piece of network hardware has. You can set your router to only accept connections from devices with MACs that you allow. Just input the MAC address for your various PCs and other devices, and anything not on the guest list will be escorted to the door. Note that if you're not comfortable with hexadecimal and the inner workings of networking, this tip may be more trouble for you than it's worth.

Improve signal: http://www.microsoft.com/athome/moredone/wirelesstips.mspx
0
 
LVL 39

Expert Comment

by:PUNKY
ID: 18880239
And I recommend to use Linksys/Cisco wireless router.
0
 
LVL 12

Expert Comment

by:WallD
ID: 18880948
I would definitely not use wep encription it is easily broken, also hiding your ssid is not the best idea as it is easily found with netstumbler.

MAC number security can be overcome easily I believe with kismet but have never tried it.

The best defence WPA security if ypur devices dont supportthem I would definitely upgrade them so that it can be used.



0

Featured Post

ScreenConnect 6.0 Free Trial

At ScreenConnect, partner feedback doesn't fall on deaf ears. We collected partner suggestions off of their virtual wish list and transformed them into one game-changing release: ScreenConnect 6.0. Explore all of the extras and enhancements for yourself!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
belkin wifi stick 12 95
Outdoor Wifi Radio with Splash Page 6 64
Distributing wireless 5 59
Flashing Cisco Meraki MR18 with OpenWRT firmware ? 5 310
I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question